Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24/06/2024, 01:46
Behavioral task
behavioral1
Sample
03f80b7dba1209d54298ffee6dd7d6c5.exe
Resource
win7-20231129-en
General
-
Target
03f80b7dba1209d54298ffee6dd7d6c5.exe
-
Size
387KB
-
MD5
03f80b7dba1209d54298ffee6dd7d6c5
-
SHA1
2dd649fcbafa9ef687995150e0f29592e5109320
-
SHA256
bd801ec767786092b2b82051c673a9779cc3698b8b15b10146b90f4928d9f9a8
-
SHA512
25f3520ff60ee0616933f1afef7432c02fc635f4f2f5ee847b4dbbaabddfa0095fc5d58253b56eb3b19cc3cf71f655b76284c712f405b70a311225ac0cc1f589
-
SSDEEP
6144:vrQ7XBrQ7XBrQ7XlrQ7XzdyctYrT7/PsW8EZd40seWs9Zxip:vrEBrEBrElrEzbtYLPsfEHlWs9ap
Malware Config
Signatures
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini Logo1_.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini Logo1_.exe -
Executes dropped EXE 4 IoCs
pid Process 4680 Logo1_.exe 3752 03f80b7dba1209d54298ffee6dd7d6c5.exe 1048 03f80b7dba1209d54298ffee6dd7d6c5.exe 2188 03f80b7dba1209d54298ffee6dd7d6c5.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/3092-0-0x0000000000400000-0x0000000000439000-memory.dmp upx behavioral2/files/0x000700000002342c-9.dat upx behavioral2/memory/3092-10-0x0000000000400000-0x0000000000439000-memory.dmp upx behavioral2/memory/4680-11-0x0000000000400000-0x0000000000439000-memory.dmp upx behavioral2/files/0x000700000002342b-13.dat upx behavioral2/memory/3752-15-0x0000000000400000-0x0000000000439000-memory.dmp upx behavioral2/files/0x0008000000023429-16.dat upx behavioral2/memory/3752-19-0x0000000000400000-0x0000000000439000-memory.dmp upx behavioral2/memory/1048-23-0x0000000000400000-0x0000000000439000-memory.dmp upx behavioral2/memory/1048-27-0x0000000000400000-0x0000000000439000-memory.dmp upx behavioral2/files/0x000800000002342b-29.dat upx behavioral2/memory/2188-31-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral2/memory/4680-36-0x0000000000400000-0x0000000000439000-memory.dmp upx behavioral2/memory/4680-3661-0x0000000000400000-0x0000000000439000-memory.dmp upx behavioral2/memory/4680-8800-0x0000000000400000-0x0000000000439000-memory.dmp upx -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Office\root\Office16\Document Parts\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\ca-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\fi-fi\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\sl-sl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\ink\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\ko-kr\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft Analysis Services\AS OLEDB\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\fr-fr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\sv-se\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\ko-kr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\hr-hr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\ca-es\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Office\root\Office16\FPA_f4\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSIPC\es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\ru-ru\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\sl-si\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\generic-rhp-app\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\es-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\ar-ae\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\pt-br\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\uk-ua\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\images\themes\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagement\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagementSource\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\root\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\eu-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\es-es\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre-1.8\lib\security\policy\limited\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\de\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\da-dk\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\zh_TW\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\sv-se\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\hu-hu\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\ar-ae\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\Plugins2\_desktop.ini Logo1_.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\zh-tw\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\tr-tr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example2.Diagnostics\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\images\cursors\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\legal\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\Office16\en-us\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\hr-hr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000050\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example3.Diagnostics\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\pt-br\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\es-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\uk-ua\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\en-gb\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\hr-hr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\js\nls\fr-fr\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft Analysis Services\AS OLEDB\140\Resources\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ka\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\fr-ma\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Mail\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\en\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\zh-tw\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\host\fxr\6.0.27\_desktop.ini Logo1_.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\Logo1_.exe 03f80b7dba1209d54298ffee6dd7d6c5.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\Dll.dll Logo1_.exe File created C:\Windows\rundl132.exe 03f80b7dba1209d54298ffee6dd7d6c5.exe File created C:\Windows\Logo1_.exe 03f80b7dba1209d54298ffee6dd7d6c5.exe File created C:\Windows\Logo1_.exe 03f80b7dba1209d54298ffee6dd7d6c5.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3700 2188 WerFault.exe 96 -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3092 03f80b7dba1209d54298ffee6dd7d6c5.exe 3092 03f80b7dba1209d54298ffee6dd7d6c5.exe 3092 03f80b7dba1209d54298ffee6dd7d6c5.exe 3092 03f80b7dba1209d54298ffee6dd7d6c5.exe 3092 03f80b7dba1209d54298ffee6dd7d6c5.exe 3092 03f80b7dba1209d54298ffee6dd7d6c5.exe 3092 03f80b7dba1209d54298ffee6dd7d6c5.exe 3092 03f80b7dba1209d54298ffee6dd7d6c5.exe 3092 03f80b7dba1209d54298ffee6dd7d6c5.exe 3092 03f80b7dba1209d54298ffee6dd7d6c5.exe 3092 03f80b7dba1209d54298ffee6dd7d6c5.exe 3092 03f80b7dba1209d54298ffee6dd7d6c5.exe 3092 03f80b7dba1209d54298ffee6dd7d6c5.exe 3092 03f80b7dba1209d54298ffee6dd7d6c5.exe 3092 03f80b7dba1209d54298ffee6dd7d6c5.exe 3092 03f80b7dba1209d54298ffee6dd7d6c5.exe 3092 03f80b7dba1209d54298ffee6dd7d6c5.exe 3092 03f80b7dba1209d54298ffee6dd7d6c5.exe 3092 03f80b7dba1209d54298ffee6dd7d6c5.exe 3092 03f80b7dba1209d54298ffee6dd7d6c5.exe 3092 03f80b7dba1209d54298ffee6dd7d6c5.exe 3092 03f80b7dba1209d54298ffee6dd7d6c5.exe 3092 03f80b7dba1209d54298ffee6dd7d6c5.exe 3092 03f80b7dba1209d54298ffee6dd7d6c5.exe 3092 03f80b7dba1209d54298ffee6dd7d6c5.exe 3092 03f80b7dba1209d54298ffee6dd7d6c5.exe 4680 Logo1_.exe 4680 Logo1_.exe 4680 Logo1_.exe 4680 Logo1_.exe 4680 Logo1_.exe 4680 Logo1_.exe 4680 Logo1_.exe 4680 Logo1_.exe 4680 Logo1_.exe 4680 Logo1_.exe 4680 Logo1_.exe 4680 Logo1_.exe 4680 Logo1_.exe 4680 Logo1_.exe 4680 Logo1_.exe 4680 Logo1_.exe 4680 Logo1_.exe 4680 Logo1_.exe 4680 Logo1_.exe 4680 Logo1_.exe 4680 Logo1_.exe 4680 Logo1_.exe 4680 Logo1_.exe 4680 Logo1_.exe 4680 Logo1_.exe 4680 Logo1_.exe 4680 Logo1_.exe 4680 Logo1_.exe 4680 Logo1_.exe 4680 Logo1_.exe 4680 Logo1_.exe 4680 Logo1_.exe 4680 Logo1_.exe 4680 Logo1_.exe 4680 Logo1_.exe 4680 Logo1_.exe 4680 Logo1_.exe 4680 Logo1_.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 3092 wrote to memory of 4288 3092 03f80b7dba1209d54298ffee6dd7d6c5.exe 81 PID 3092 wrote to memory of 4288 3092 03f80b7dba1209d54298ffee6dd7d6c5.exe 81 PID 3092 wrote to memory of 4288 3092 03f80b7dba1209d54298ffee6dd7d6c5.exe 81 PID 4288 wrote to memory of 1496 4288 net.exe 83 PID 4288 wrote to memory of 1496 4288 net.exe 83 PID 4288 wrote to memory of 1496 4288 net.exe 83 PID 3092 wrote to memory of 4988 3092 03f80b7dba1209d54298ffee6dd7d6c5.exe 84 PID 3092 wrote to memory of 4988 3092 03f80b7dba1209d54298ffee6dd7d6c5.exe 84 PID 3092 wrote to memory of 4988 3092 03f80b7dba1209d54298ffee6dd7d6c5.exe 84 PID 3092 wrote to memory of 4680 3092 03f80b7dba1209d54298ffee6dd7d6c5.exe 85 PID 3092 wrote to memory of 4680 3092 03f80b7dba1209d54298ffee6dd7d6c5.exe 85 PID 3092 wrote to memory of 4680 3092 03f80b7dba1209d54298ffee6dd7d6c5.exe 85 PID 4680 wrote to memory of 1524 4680 Logo1_.exe 87 PID 4680 wrote to memory of 1524 4680 Logo1_.exe 87 PID 4680 wrote to memory of 1524 4680 Logo1_.exe 87 PID 1524 wrote to memory of 4476 1524 net.exe 89 PID 1524 wrote to memory of 4476 1524 net.exe 89 PID 1524 wrote to memory of 4476 1524 net.exe 89 PID 4988 wrote to memory of 3752 4988 cmd.exe 90 PID 4988 wrote to memory of 3752 4988 cmd.exe 90 PID 4988 wrote to memory of 3752 4988 cmd.exe 90 PID 3752 wrote to memory of 3512 3752 03f80b7dba1209d54298ffee6dd7d6c5.exe 91 PID 3752 wrote to memory of 3512 3752 03f80b7dba1209d54298ffee6dd7d6c5.exe 91 PID 3752 wrote to memory of 3512 3752 03f80b7dba1209d54298ffee6dd7d6c5.exe 91 PID 3512 wrote to memory of 1048 3512 cmd.exe 93 PID 3512 wrote to memory of 1048 3512 cmd.exe 93 PID 3512 wrote to memory of 1048 3512 cmd.exe 93 PID 1048 wrote to memory of 1860 1048 03f80b7dba1209d54298ffee6dd7d6c5.exe 94 PID 1048 wrote to memory of 1860 1048 03f80b7dba1209d54298ffee6dd7d6c5.exe 94 PID 1048 wrote to memory of 1860 1048 03f80b7dba1209d54298ffee6dd7d6c5.exe 94 PID 1860 wrote to memory of 2188 1860 cmd.exe 96 PID 1860 wrote to memory of 2188 1860 cmd.exe 96 PID 1860 wrote to memory of 2188 1860 cmd.exe 96 PID 4680 wrote to memory of 4512 4680 Logo1_.exe 102 PID 4680 wrote to memory of 4512 4680 Logo1_.exe 102 PID 4680 wrote to memory of 4512 4680 Logo1_.exe 102 PID 4512 wrote to memory of 3544 4512 net.exe 104 PID 4512 wrote to memory of 3544 4512 net.exe 104 PID 4512 wrote to memory of 3544 4512 net.exe 104 PID 4680 wrote to memory of 3552 4680 Logo1_.exe 56 PID 4680 wrote to memory of 3552 4680 Logo1_.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3552
-
C:\Users\Admin\AppData\Local\Temp\03f80b7dba1209d54298ffee6dd7d6c5.exe"C:\Users\Admin\AppData\Local\Temp\03f80b7dba1209d54298ffee6dd7d6c5.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:4288 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:1496
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a7B5A.bat3⤵
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Users\Admin\AppData\Local\Temp\03f80b7dba1209d54298ffee6dd7d6c5.exe"C:\Users\Admin\AppData\Local\Temp\03f80b7dba1209d54298ffee6dd7d6c5.exe"4⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3752 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a7C15.bat5⤵
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Users\Admin\AppData\Local\Temp\03f80b7dba1209d54298ffee6dd7d6c5.exe"C:\Users\Admin\AppData\Local\Temp\03f80b7dba1209d54298ffee6dd7d6c5.exe"6⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a7C83.bat7⤵
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Users\Admin\AppData\Local\Temp\03f80b7dba1209d54298ffee6dd7d6c5.exe"C:\Users\Admin\AppData\Local\Temp\03f80b7dba1209d54298ffee6dd7d6c5.exe"8⤵
- Executes dropped EXE
PID:2188 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2188 -s 4089⤵
- Program crash
PID:3700
-
-
-
-
-
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:4476
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:3544
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 2188 -ip 21881⤵PID:392
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
530B
MD55934de34f04d1e7b239836827ee67306
SHA17e0f363dedd99f4f7acc91cef92f2fe9deb57c62
SHA256bd5093012a753906c2e0c1716deb23c36aa0922d75f1b3ea2352667317d224e7
SHA5120756e1eb56b211be9e56b5da3ba0808ee7a9fdbf1f88720ac2cdfd9cd76948ee3bf1edbc8fa5d8b8eaedf78a4676a64d92993a1daed735d619e315087d54e807
-
Filesize
530B
MD5916dd5451f893cc2002ee0476f025294
SHA1f6445c14b62132e52aea31f09e8eeaf72a9c353e
SHA256b116f084f8c8e8556f1b55ef2e0edd57c9b61a929137c3af5f42eb41f045d6fa
SHA512db362a09540b2d20663cf6381b09eb6676db77e4a9ae62e38b9a7d0d55c2fdb2cc14046bbb37132571f34d8d7a55feeb1fffc1a374e2876e9ee9ace9b77366f7
-
Filesize
530B
MD56787ea5367b49b571d11806557506031
SHA195e9fa0b4f352a1b38372dabdf50a41d8d47ba0d
SHA256cdf44ecddf85244d3b065907665f01fe7bf6b61401c13f1935e9ebdc51ddf5fa
SHA51272cb9d6b43020f4ae76be2044556c6be79c88068bc763cd047489a7476df8bb9055318e71545085e5e5f202fbd9dd7c6e502ba485da9b607d07839f25bb2c747
-
Filesize
339KB
MD5e290e3f05888c41b183b1b0ccf5a78e8
SHA1fe1959dddfce6f7e87234165eea8d6eff33fc513
SHA2567a19b98cbf1996794029692a052528cf14fc63363a1cd82b8e97c50a346ed83e
SHA512039f807436ffe44334fb4ab97d32dafce031b628bf849c65b43a2735d79cf75b034ac5cf16c9ed106c2f699677aed8ad4ea3df6a0b6faecaf5f9b6aa8475f9ee
-
Filesize
291KB
MD5db56329ce568e2d9a024fb904725e037
SHA17401f6ec77dc4f8b7e4ed0b18098a25288484a01
SHA2564176a9e93eab3c08ca0d833521d619a36b70284b2fa0fbcb371305976cc2dbe6
SHA512b618dc53e84db8e6d55c7986afc9574d462a833d0a411b0233b36f8e76082e3b1eb769f79d60babeab6650b3e28c3ad92485fe5b3123ce2b43fd381c9d000ab0
-
Filesize
243KB
MD5b7ee473ea670df0f7ca4370ab87b8d4a
SHA1f04f50f4ed202fac2d4bdd4672ed6a2389695a24
SHA256a7489a46923034f0088dfaf200ccd66674438a091a99b1039bd5619e8e7f8e60
SHA512ce1219a65e7a268150cfde043f693eb9c8173f78ef5aec67577517c57d80af665e013071b4f470c4ad233cbe7818d8a10678955344320d0f8286ecfb329e3e9d
-
Filesize
48KB
MD588fedeec237fd85692523e1fc470a43f
SHA1fe93b1c009682a49a48ed40f1f1e31ac026b16d9
SHA256541cf3e519b509f16eb92b24da4bdb73af9873d5df9ceaa3400590de350d1858
SHA512af1e1aa3c93166c5ab23243fed131415203f77ec4f34474522b35e646dcadd3ab5ca6243ef9eaa8236a071d4a69593c3f79e9297fab51c0a75f3093ce9ae08e5
-
Filesize
9B
MD5f0a92d08416cb87dc153ea387c708411
SHA137c1e98506bdb3d5ea2e7fcb62bb91c9bf5b4fb1
SHA256478ccf01e44e5bd446e37007b199568a73c0452e34ce917945fd820710107464
SHA5121dd7d96307c01abb2985ed1d39617787563174f5b90df9786106259ea12a08bdf39662c440bdc4b3ac4f6bb499a4aaf058ed18e06ef72be5f82f01b7150ec9a5